-
Recent Posts
- conda, mlflow, windows 10
- Weaponized cells seek and destroy HIV lurking in the body
- The demise of docker and the rise of kubernetes – The HFT Guy
- Lower error bounds for the stochastic gradient descent optimization algorithm: Sharp convergence rates for slowly and fast decaying learning rates
- Versatile virus hops between three primate species — including humans
Recent Comments
Elephant on Review of Eric Foner’s R… ordo tacitus on Review of Eric Foner’s R… Elephant on Review of Eric Foner’s R… Elephant on Review of Brian M. Linn’… ordo tacitus on Peripheral Vision 003: Profess… Blogroll
Tags
- Afghanistan
- al-shabaab
- analysis
- android
- bias
- biology
- book review
- Business
- byod
- cats
- chen style
- coffee
- coldfusion
- computers
- crowd sourcing
- d13
- data
- defense
- development
- economics
- education.
- encryption
- exercise
- fallacies
- fitness
- flask
- future
- futurism
- gaming
- Glass
- hacking
- history
- hopology
- humour
- innovation
- intel
- internet
- java
- law
- lean
- legal
- martial arts
- math
- mathematics
- medicine
- military history
- mobile
- news
- opinion
- physics
- politics
- privacy
- programing
- programming
- python
- R
- research
- scotch
- secret key
- security
- social media
- space
- space technology
- space travel
- tablets
- terrorism
- testing
- thinking
- training
- visualization
- war
- windows
- wireless
- xbox
Archives
- November 2019
- October 2019
- September 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- July 2017
- February 2017
- November 2016
- July 2016
- April 2016
- May 2015
- April 2015
- February 2015
- January 2015
- December 2014
- October 2014
- September 2014
- August 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
Categories
Meta
Monthly Archives: May 2014
Troy Hunt: The mechanics of the iCloud “hack” and how iOS devices are being held to ransom Really good write up of the iCloud ransom attacks. That being said I think there is a lot more to be said here … Continue reading
Apps for Pentestets using Android
So of the applications on here could be very useful for physical pentration and technology based pentration testing. For example against facilities that dont have public access to the internet but still use local networks or even just use wireless … Continue reading
Posted in Uncategorized
Leave a comment
Twitter / robi_sen: Short history of Boko Haram …
Twitter / robi_sen: Interesting malicious iOS plugin … Interesting malicious iOS plugin
Build Your Own Robi! Seriously who would not want their own Robi!
Interesting net neutrality opinion
O’Rielly wrote. “This pattern will likely recur as online streaming becomes even more popular. What happens under a net neutrality regime if Netflix, YouTube, or Hulu flex their muscles in the marketplace? Should the FCC similarly scrutinize their business decisions? … Continue reading
Posted in Uncategorized
Leave a comment
Kronecker Graphs: An Approach to Modeling Networks
Interesting paper How can we model networks with a mathematically tractable model that allows for rigorous analysis of network properties? Networks exhibit a long list of surprising properties: heavy tails for the degree distribution; small diameters; and densification and shrinking … Continue reading